Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-43943 | When adding a remote backup location, an authenticated user can pass arbitrary OS commands through the username field. The username is passed without sanitization into CMD running as NT/Authority System. An authenticated attacker can leverage this vulnerability to execute arbitrary code with system-level access to the CyberPower PowerPanel Enterprise server. |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 09 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-10-09T15:45:50.252Z
Reserved: 2023-06-15T06:50:38.458Z
Link: CVE-2023-3267
Updated: 2024-08-02T06:48:08.577Z
Status : Modified
Published: 2023-08-14T05:15:10.133
Modified: 2024-11-21T08:16:51.730
Link: CVE-2023-3267
No data.
OpenCVE Enrichment
No data.
EUVD